Download Network Protocols

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Parallel port wikipedia , lookup

Net bias wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Zigbee wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Distributed firewall wikipedia , lookup

TCP congestion control wikipedia , lookup

CAN bus wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

IEEE 1355 wikipedia , lookup

Airborne Networking wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

AppleTalk wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Zero-configuration networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Transcript
Introduction and Review –
Network Protocols
Copyright © Lopamudra Roychoudhuri
1
What’s a Protocol?
Human protocols:
Network protocols:
 “What’s the time?”
 Machines rather than
 “I have a question”
humans
 Introductions and good-  All communication
byes
activity in Internet
governed by protocols
… Specific messages sent
… Specific actions taken
when messages
received, or other
events
3
What’s a protocol?
A human protocol and a computer network protocol:
Hi
TCP connection
request
Hi
TCP connection
response
Got the
time?
Get http://www.awl.com/kurose-ross
2:00
<file>
time
Q: Other human protocols?
4
Network Protocols


A set of agreed-upon rules in which computers exchange
information (rules for communication)
 Define what is communicated; how it is
communicated; when it is communicated
Key elements of a protocol:
 Syntax:
 structure or format of the data
 Semantics:
 Meanings of each section of bits
 Timing/Procedure:
 when data should be sent and how fast it can be
sent.
5
Layered Protocol Architecture


Modules arranged in a vertical stack
Each layer in stack:
 Performs related functions (Each layer
implements a service)



Relies on lower layer for more primitive
functions
Provides services to next higher layer
Communicates with corresponding peer
layer of neighboring system using a
protocol
6
OSI model
 International Standards Organization
(ISO, est. 1947)
 A multinational body dedicated to worldwide
agreement on international standards
 Open Systems Interconnection (OSI)
model
 An ISO standard that covers all aspects of
network communications
 First introduced in 1977.
7
OSI Layers
8
Layer 1 - Physical
The physical layer is responsible for the movement of
individual bits from one hop (node) to the next.
9
Layer 2 - Data Link
The data link layer is responsible for moving frames from
one hop (node) to the next hop.
10
Layer 3 - Network
The network layer is responsible for the delivery of
individual packets from the source host to the destination
host via hops.
11
Source-to-destination delivery
12
Layer 3-Network cont.



Addressing of network nodes
Sends data to correct address (possibly
across multiple networks)
Examples: IP (Internet Protocol),
Appletalk, Novell IPX
13
Layer 4 - Transport
The transport layer is responsible for the delivery of a
whole message (called segment) from one process to
another process.
14
Reliable process-to-process
delivery of a message
15
Layer 4 – Transport cont.


Controls end-to-end error correction
and flow control
Example: Transmission Control Protocol
(TCP)
16
Layer 5 – Session




Sets up and manages logical sessions
between client programs and servers
Synchronization – mechanism for
inserting check points
Dialog control – half-duplex or fullduplex
Example: NetBIOS Extended User
Interface (NETBEUI) (Microsoft)
17
Layer 6: Presentation
Provides conversions between different code sets
(e.g., ASCII to EBCDIC or vice versa)
Also provides compression and encryption
18
ASCII Code vs. EBCDIC Code
19
Layer 7: Application
(directory
Services)
(File transfer,
Access & mgmt)
(msg handling
Services)
Functional application, not brand names
Examples: File Transfer Protocol (FTP), Telnet, Simple
Mail Transfer Protocol (SMTP)
20
Summary of OSI Layers
e.g. EBCDIC to ASCII
Synchronization mechanisms and Dialog
control (half-duplex or full-duplex)
Messages
End-to-end Error and Flow
Control
Packets
Frames
Error and Flow Control over a
single link
Bits
21
OSI Layers cont.
Source
Destination
Hop
Hop
‘End-to-end’ protocols
‘Hop-to-Hop’ protocols
22
Internet Protocol Stack


Developed by Cerf/Kahn in the early
‘70s (earlier to OSI model)
Application:
supporting network
applications
 FTP, SMTP, SSH

Transport:


host-host data transfer
TCP, UDP, SCTP
Network:
routing of datagrams from source
to destination
 IP, routing protocols


Link:
data transfer between neighboring
network elements
 PPP, Ethernet
Physical:
bits “on the wire”
5-layer
Application
Transport
Network
Link
Physical
23
TCP/IP vs. OSI Model
Connection-oriented
Connectionless
24
Connectionless vs. Connectionoriented
Connectionless Service
No connection setup necessary before sending data
Data sequencing is not guaranteed
Example – UDP, IP
•Connection-oriented Service
A connection must be established first before data
transmission
Data sequencing is guaranteed
Example - TCP
25
Addresses in TCP/IP
•Unique address of
Network Interface Card.
•Also supports for
multicast and broadcast
physical addresses.
•e.g. Ethernet 48 bit
globally unique address
•Numerical Address
assigned to a device
participating in a network
•e.g. 32-bit IP address for
devices in an IP network
•No two computers on
the Internet can have the
same IP address
Address for processes
to communicate with
each other
- e.g. 16-bit TCP/UDP
port addresses
26
Relationship of layers and addresses in TCP/IP
27
Physical Addresses
Ethernet uses a 6-byte (48 bits, 12 hexadecimal digits) physical
address, like
07:01:02:01:2C:4B
28
MAC Addresses



Every Ethernet interface (NIC) has a 6-byte
physical address, also called MAC address
(Media Access Control) or hardware
address, which is assigned and burned into
hardware when it is manufactured.
MAC address of every Ethernet device is
guaranteed to be globally unique.
Identifies some destination device on the
same LAN. Cannot identify destination device
across any router. It is a local address.
29
How do you find your MAC address?
•
•
By running “ipconfig /all” in a command window
Output from ipconfig /all
30
Is MAC Address all we need?

The MAC address provides the physical
address for the network interface card, but
provides no information about





its network location
what LAN,
which building, city, or
even the country in which the network resides
IP addressing provides a solution to
worldwide addressing.
31
IP addresses
An internet address in IPv4
is a 4 byte global address,
separated by decimals (dotted
decimal notation),
such as 132.24.75.9
32
Layer 3 IP Addresses
Carried in Internet Protocol header
Identifies a particular host (computer), which
may be on any subnet or network. It is a
global address.
4 bytes, split into
 IP Network
 IP Host
Stored by operating system. Assigned by:
IANA, ARIN and/or ISP (Network part)
Local network administrator (Host part)
33
IP Addressing


Initially ‘classful’
We will discuss Classless (CIDR)
addressing later
34
Dotted Decimal Notation
Class A: Large networks
Class B: Medium networks
Classful IP Addresses
Class C: Small networks
Hostid with all 0’s or all 1’s are special.
35
00000000. 0 ……0
01111111. 1 ……1
10000000. 0 ……0
10111111. 1 ……1
11000000. 0 ……0
11011111. 1 ……1
36
Figure 5.9
Blocks in Class A
Figure 5.10
Blocks in Class B
Figure 5.11
Blocks in Class C
37
Figure 5.15
netid
Information extraction in classful addressing
000 ... 0
First address
38
How do you find your IP address?
•
•
By running “ipconfig /all” in a command window
Output from ipconfig /all
39
Port addresses
A port address is represented
as a 16-bit integer, such as 80
40
Layer 4 TCP Ports
 Carried in TCP header
 Identifies a particular user/server process
 2 byte port codes
 Well-Known Port Numbers assigned by
ICANN / IANA and stored in “services” file
Examples:
HTTP = port 80
File Transfer (FTP) = port 21
E-mail (SMTP) = port 25
Remote login (Telnet) = port 23
41
Example: Web Browsing
- I’m running Chrome on my Windows machine
- I type http://www.google.com.sa and hit ENTER.
WHAT HAPPENS???
42
Web Browsing Stack
My computer is running the following protocols:
•- Application Layer = HTTP (Chrome)
•- Transport Layer = TCP
•- Network Layer = IP
•- Data Link Layer = Ethernet
•- Physical Layer = Ethernet
43
Relationship of layers and addresses in TCP/IP
Example: web browser
implementing HTTP
Interface. e.g. WINSOCK on PCs
Implemented in TCP and
UDP software.
HTTP uses TCP.
e.g. TCP port 80
for web server
e.g. 192.168.1.12 (32bit)
Implemented in IP
software
e.g. Ethernet Medium
Access Control (MAC)
implemented in NIC card
(Network Interface Card)
and driver software
e.g. Ethernet address
(48-bit)
e.g. Ethernet PHY layer.
Implemented in NIC card
44